Results 241 to 250 of about 33,844 (282)
Some of the next articles are maybe not open access.

Privacy-preserving Cooperative Positioning

ION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2020
We address the issue of user privacy in the context of “collaborative” positioning, wherein information is passed between and processed by multiple cooperative agents with the goal of achieving high levels of positioning accuracy. In particular, we evaluate the feasibility of applying a layer of encryption to a linear least squares (LS) algorithm for ...
Hernandez, Guillermo   +2 more
openaire   +1 more source

Econometrics with Privacy Preservation

Operations Research, 2019
Summary: Many data are sensitive in areas such as finance, economics, and other social sciences. We propose an ER (encryption and recovery) algorithm that allows a central administration to do statistical inference based on the encrypted data, while still preserving each party's privacy even for a colluding majority in the presence of cyber attack.
Ning Cai, Steven Kou
openaire   +3 more sources

Privacy-Preserving Trust Negotiations

2005
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive interactions may often occur between entities with no prior knowledge of each other. Although several proposals today exist of systems for the management of trust negotiations none of them addresses in a comprehensive way the problem of privacy ...
ELISA BERTINO   +2 more
openaire   +2 more sources

Privacy-Preserving Outsourced Profiling

2010 IEEE 12th Conference on Commerce and Enterprise Computing, 2010
Personalized services attract high-value customers. Knowing the preferences and habits of an individual customer, it is possible to offer to that customer well customized and adapted services, matching his needs and desires. This is advantageous for the entity offering the service (e.g., a retailer) as well, as it helps in creating additional sales or ...
Biswas D., Haller S., Kerschbaum F.
openaire   +1 more source

Privacy-preserving fingercode authentication

Proceedings of the 12th ACM workshop on Multimedia and security, 2010
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server.
Mauro Barni   +10 more
openaire   +2 more sources

Privacy-preserving deep learning

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unprecedented accuracy of deep learning methods has turned them into the foundation of new AI-based services on the Internet.
Reza Shokri, Vitaly Shmatikov
openaire   +1 more source

Privacy-Preserving Smart Metering

Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping ...
Alfredo Rial, George Danezis
openaire   +1 more source

Privacy-preserving DRM

Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia Perlman   +2 more
openaire   +1 more source

Privacy-preserving Computing

2023
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades.
Chen, Kai, Yang, Qiang
openaire   +2 more sources

Privacy preservation services

Proceedings of the 2008 ACM symposium on Applied computing, 2008
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet.
Dijiang Huang   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy